Thoughtful, detailed coverage of the Mac, iPhone, and iPad, plus the best-selling Take Control ebooks.



Pick an apple! 
Sync Safari Bookmarks to Your iPhone

Tired of typing URLs into Mobile Safari on your iPhone or iPod touch? Use the bookmarks you already have in Safari on your Mac.

Next time you do an iTunes sync, select your iPhone or iPod touch in the Devices section of the iTunes sidebar. Scroll down to the Web Browser section of the Info tab on the right-hand side of the iTunes window and select Sync Safari Bookmarks.

After your next sync the bookmarks will be available in Mobile Safari on your iPhone or iPod touch.


Submitted by
Miraz Jordan


Take Control News: Is Your Wireless Network Secure?

Send Article to a Friend

We've just released a new version of "Take Control of Your Wi-Fi Security," penned jointly by wireless networking guru Glenn Fleishman and Take Control publisher Adam Engst. The ebook is aimed at anyone who is running a home or small-office wireless network and who wants to set up and maintain an appropriate security level for their needs and budget. Glenn and Adam have been publishing articles and books about wireless security for ages, so this new version contains the distilled essence of years of thinking about the topic, along with fresh material to bring their discussions up to date for 2009. They have added the latest details relating to Mac OS X 10.5 Leopard, current recommendations for setting up WPA and WPS security, and steps for configuring guest networking with Apple's recently released base stations. To ensure that your wireless network is appropriately secure, pick up a copy of the $10 ebook.

Although the last update to "Take Control of Your Wi-Fi Security" came in October 2007, we're still making this version a free update for anyone who owns a previous edition of the ebook. In your existing PDF, click Check for Updates on the first page to access a download link.

"Take Control of Your Wi-Fi Security" helps you assess your real-world security risk, and aids in evaluating the likelihood of a security-related problem, the potential severity of a break-in, and the opportunity cost of securing your wireless network. It then goes on to explain the pros and cons of various security techniques, explaining how to implement the best ones to secure your network and your data in transit. It covers Mac OS X, Windows XP, and Windows Vista.


READERS LIKE YOU! Support TidBITS by becoming a member today!
Check out the perks at <>
Special thanks to Gary Villere, Pete, Ann Hennies, and Trevor Lawrence
for their generous support!